Memory Management Flaw in curl Affects SMB Protocol Requests
CVE-2026-3805

7.5HIGH

Key Information:

Vendor

Curl

Status
Vendor
CVE Published:
11 March 2026

What is CVE-2026-3805?

CVE-2026-3805 is a vulnerability identified within the curl software, a widely used tool for transferring data with URLs. Specifically, this flaw arises from a memory management issue related to Server Message Block (SMB) protocol requests. When curl attempts a second SMB request to the same host, it inadvertently references a data pointer that points to memory that has already been released. As a result, this can lead to unpredictable behavior, including application crashes or potentially exposing sensitive data, which negatively impacts the integrity and security of systems relying on curl for file sharing and network operations.

Organizations leveraging curl for communication with SMB services may find themselves at risk if this vulnerability is exploited, as it could compromise critical operations and lead to significant disruptions in service and data handling.

Potential Impact of CVE-2026-3805

  1. Data Integrity Risks: Exploitation of this vulnerability could result in data being manipulated or corrupted due to incorrect memory references, compromising the integrity of files transferred over SMB.

  2. Service Disruptions: The improper handling of memory can lead to application crashes and outages, resulting in service unavailability during critical operations, thereby impacting business continuity.

  3. Potential for Data Exposure: If exploited, this vulnerability could inadvertently expose sensitive information to unauthorized users, which poses a significant threat to organizational data security and compliance with regulatory standards.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

curl 8.18.0

curl 8.17.0

curl 8.16.0

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Daniel Wade
Stefan Eissing
.